A survey of main memory acquisition and analysis techniques for the windows operating system

S Vömel, FC Freiling - Digital Investigation, 2011 - Elsevier
Traditional, persistent data-oriented approaches in computer forensics face some limitations
regarding a number of technological developments, eg, rapidly increasing storage …

Lest we remember: cold-boot attacks on encryption keys

JA Halderman, SD Schoen, N Heninger… - Communications of the …, 2009 - dl.acm.org
Contrary to widespread assumption, dynamic RAM (DRAM), the main memory in most
modern computers, retains its contents for several seconds after power is lost, even at room …

Protecting data on smartphones and tablets from memory attacks

P Colp, J Zhang, J Gleeson, S Suneja… - Proceedings of the …, 2015 - dl.acm.org
Smartphones and tablets are easily lost or stolen. This makes them susceptible to an
inexpensive class of memory attacks, such as cold-boot attacks, using a bus monitor to …

Case: Cache-assisted secure execution on arm processors

N Zhang, K Sun, W Lou, YT Hou - 2016 IEEE Symposium on …, 2016 - ieeexplore.ieee.org
Recognizing the pressing demands to secure embedded applications, ARM TrustZone has
been adopted in both academic research and commercial products to protect sensitive code …

On the practicability of cold boot attacks

M Gruhn, T Müller - 2013 International Conference on …, 2013 - ieeexplore.ieee.org
Even though a target machine uses full disk encryption, cold boot attacks can retrieve
unencrypted data from RAM. Cold boot attacks are based on the remanence effect of RAM …

A logic of secure systems and its application to trusted computing

A Datta, J Franklin, D Garg… - 2009 30th IEEE …, 2009 - ieeexplore.ieee.org
We present a logic for reasoning about properties of secure systems. The logic is built
around a concurrent programming language with constructs for modeling machines with …

RegKey: a register-based implementation of ECC signature algorithms against one-shot memory disclosure

Y Fu, J Lin, D Feng, W Wang, M Wang… - ACM Transactions on …, 2023 - dl.acm.org
To ensure the security of cryptographic algorithm implementations, several cryptographic
key protection schemes have been proposed to prevent various memory disclosure attacks …

Efficient temporal join processing using indices

D Zhang, VJ Tsotras, B Seeger - … 18th International Conference …, 2002 - ieeexplore.ieee.org
We examine the problem of processing temporal joins in the presence of indexing schemes.
Previous work on temporal joins has concentrated on non-indexed relations which were fully …

Forenscope: A framework for live forensics

E Chan, S Venkataraman, F David… - Proceedings of the 26th …, 2010 - dl.acm.org
Current post-mortem cyber-forensic techniques may cause significant disruption to the
evidence gathering process by breaking active network connections and unmounting …

SRAM has no chill: exploiting power domain separation to steal on-chip secrets

J Mahmod, M Hicks - Proceedings of the 27th ACM International …, 2022 - dl.acm.org
The abundance of embedded systems and smart devices increases the risk of physical
memory disclosure attacks. One such classic non-invasive attack exploits dynamic RAM's …